Static task
static1
Behavioral task
behavioral1
Sample
883416f1def7f25d1942a5b98737f8d7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
883416f1def7f25d1942a5b98737f8d7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
883416f1def7f25d1942a5b98737f8d7_JaffaCakes118
-
Size
282KB
-
MD5
883416f1def7f25d1942a5b98737f8d7
-
SHA1
ee5471c69c5172d9d0c57f66c1cb6a2f9959b5b7
-
SHA256
c85e6a903deef8c7b31e15c3407e6363963105b7ad253451dc04137328bef1b5
-
SHA512
1c8b5f5e835053f901bc92be446cae6026b5cbcde5d3ecb05e50df6de828a988898c432ade31a94ea5654f3cfc61f0c76b03f9809b8074143d5445de2bd02ce3
-
SSDEEP
6144:1YuUajTcIuw4mPMZ50HFGgGfILJ/Zv/TGmUs+xkFrb+ANbsj:1JaB10w8L5F/TG/k59U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 883416f1def7f25d1942a5b98737f8d7_JaffaCakes118
Files
-
883416f1def7f25d1942a5b98737f8d7_JaffaCakes118.exe windows:4 windows x86 arch:x86
1350e794bfa1dcf13d500dc702c56937
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mprapi
MprConfigServerConnect
MprConfigServerDisconnect
MprConfigGetFriendlyName
kernel32
FreeEnvironmentStringsA
AddAtomA
TlsGetValue
GetCPInfo
TlsAlloc
GetOEMCP
VirtualQuery
VirtualFree
IsBadWritePtr
GetFileType
GetStartupInfoA
GetEnvironmentStrings
GetSystemTimeAsFileTime
GetStdHandle
GetModuleFileNameA
InterlockedExchange
GetVersionExA
UnhandledExceptionFilter
EnumResourceLanguagesA
HeapDestroy
GetCurrentProcessId
SetHandleCount
FreeEnvironmentStringsW
lstrcpynW
GetEnvironmentStringsW
GetACP
TlsFree
GetLocaleInfoA
QueryPerformanceCounter
SetLastError
VirtualAlloc
GetSystemInfo
HeapSize
HeapCreate
WriteFile
TlsSetValue
SetEndOfFile
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
setupapi
CM_Get_Parent
SetupDiGetDeviceRegistryPropertyW
CMP_WaitNoPendingInstallEvents
CM_Get_DevNode_Status
iphlpapi
GetIpAddrTable
shell32
SHGetFolderPathW
newdev
UpdateDriverForPlugAndPlayDevicesW
user32
IsWindow
SendMessageA
EnumChildWindows
GetDlgItem
DestroyWindow
CreateWindowExW
GetWindowThreadProcessId
Sections
.text Size: 140KB - Virtual size: 275KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ